eG Monitoring
 

Measures reported by CtxNsIpTest

This test monitors the IP (Internet Protocol) traffic on the NetScaler appliance, measures the current IP load on the NetScaler device, and promptly captures IP-related anomalies.

The measures made by this test are as follows:

Measurement Description Measurement Unit Interpretation
Data_received Indicates the amount of IP data received during the last measurement period. MB  
Data_transmitted Indicates the amount of IP data transmitted during the last measurement period. MB  
Packets_received Indicates the number of IP packets received during the last measurement period. Number  
Packets_transmitted Indicates the number of IP packets transmitted during the last measurement period. Number  
Routed_ip_packets Indicates the number of IP packets that were routed during the last measurement period. Number  
Routed_ip_data Indicates the amount of IP data that was routed during the last measurement period. Mbits  
Fragments_received Indicates the number of IP packet fragments received during the last measurement period. Number The Internet Protocol (IP) implements fragmentation, so that packets may be formed that can pass through a link with a smaller maximum transmission unit (MTU) than the original datagram size.

IP fragments received by the NetScaler appliance will have to be reassembled by the appliance before they are forwarded to the virtual server they are meant for. IP fragmentation and reassembly operations can cause the NetScaler appliance to incur heavy overheads. To alleviate this, you can enable the Path MTU discovery algorithm of the Netcaler apliance for dynamically learning the MTU (Maximum Transmission Unit) of any Internet path. The discovered Path MTU is then used by the TCP/IP stack on the NetScaler to create packets of this size (or smaller). Path MTU Discovery is disabled by default.

Successfully_reassembled Indicates the number of IP packets that were successfully reassembled by the NetScaler appliance during the last measurement period. Number IP fragments received by the NetScaler appliance will have to be reassembled by the appliance before they are forwarded to the virtual server they are meant for. Ideally therefore, the value of this measure should be high. A low value indicates too many reassembly failures. This can occur when there is a checksum failure, an identification field mismatch, or when one of the fragments is missing.
Reassembly_attempted Indicates the number of fragmented IP packets that the NetScaler attempted to reassemble during the last measurement period. Number  
IP_address_lookups Indicates the number of IP address lookups performed by the Netscaler during the last measurement period. Number When an IP packet is received on a non-established session, the NetScaler checks if the destination IP address is one of the NetScaler owned IP addresses.
IP_address_lookup_fails Indicates the number of IP address lookups performed by the Netscaler has failed during the last measurement period. Number When an IP packet is received on a non-established session, the NetScaler checks if the destination IP address is one of the NetScaler owned IP addresses. The NetScaler-owned IP Addresses-NetScaler IP Address (NSIP), Virtual IP Addresses (VIPs), Subnet IP Addresses (SNIPs), Mapped IP Addresses (MIPs), and Global Server Load Balancing Site IP Addresses (GSLBIPs)-exist only on the NetScaler appliance. The NSIP uniquely identifies the NetScaler on your network, and it provides access to the appliance.

The IP address lookup failure occurs when the destination IP address of the packet does not match any of the NetScaler owned IP addresses.

Naturally therefore, the value of IP_address_lookup_fails measure should be very low.

Pct_of_ip_lookup_succes Indicates the percentage of IP address lookups that were successfully performed by the Netscaler during the last measurement period. Percent A high value is desired for this measure.
Pct_of_ip_lookup_fails Indicates the percentage of IP address lookups that failed during the last measurement period. Percent The IP address lookup failure occurs when the destination IP address of the packet does not match any of the NetScaler owned IP addresses.

The value of this measure is computed using the following formula:

(IP address lookup failures/IP address lookups) * 100.0

A low value is is desired for this measure.
Udp_frag_fwd Indicates the number of UDP fragments that were forwarded to the client or server during the last measurement period. Number  
Tcp_frag_fwd Indicates the number of TCP fragments that were forwarded to the client or server during the last measurement period. Number  
Frag_packets_created Indicates the number of UDP fragments that were forwarded to the client or server during the last measurement period. Number  
Bad_ip_checksum Indicates the number of IP packets that were received with IP checksum error during the last measurement period. Number  
Unsuccessful_reassambly Indicates the number of received IP packets that could not be reassembled during the measurement period. Number IP fragments received by the NetScaler appliance will have to be reassembled by the appliance before they are forwarded to the virtual server they are meant for. Ideally therefore, the value of this measure should be low. A high value indicates too many reassembly failures. This can occur when there is a checksum failure, an identification field mismatch, or when one of the fragments is missing.
Reassembled_data_too_big Indicates the number of IP packets whose data length exceeds the Ethernet packet data length of 1500 bytes after being reassembled by the Netscaler during the last measurement period. Number  
Zero_frag_length_recvd Indicates the number of IP packets that were received with a fragment length of 0 bytes during the last measurement period. Number  
Duplicate_frag_recvd Indicates the number of duplicate IP fragments received during the last measurement period. Number This can occur when the acknowledgement was not received within the expected time.
Out_of_order_frag_recvd Indicates the number of IP fragments that were received in out of order condition during the last measurement period. Number When a datagram is fragmented, each fragment becomes its own datagram and is routed to the NetScaler independently of any other datagrams. This is why, the original datagram often arrives at the NetScaler out of order.
Unknown_dest_recvd Indicates the number of IP packets received with the destination IP address not reachable or not owned by the NetScaler during the last measurement period. Number Ideally, the value of this measure should be 0.
Bad_transport Indicates the number of packets received in which the protocol specified in the IP header is unknown to the NetScaler during the last measurement period. Number Ideally, the value of this measure should be 0.
Vit_down Indicates the number of IP packets received by the Netscaler when the Virtual IP (VIP) is down during the last measurement period. Number A VIP is a public IP address to which a client sends requests.

The NetScaler receives these request packets when all the services bound to the VIP are down or the VIP is manually disabled.

Fix_header_failure Indicates the number of received packets with errors in one or more fields of the IP header during the last measurement period. Number Ideally, this value should be 0.
Ttl_expired_during_trans Indicates the number of packets for which the time-to-live (TTL) expired during transit during the last measurement period. Number These packets are dropped.
Max_non_tcp_clients Indicates the total number of times during the last measurement period NetScaler tried to open a new connection to a service having maximum number of allowed open client connections. Number  
Unknown_services Indicates the number of IP packets received on a port or service that is not configured for the Netscaler during the last measurement period. Number  
Land_attack_pkts_recvd Indicates the number of Land-attack packets received by the Netscaler during the last measurement period. Number The Land-attack packets are spoofed packets that are designed to attack systems. A Land Attack consists of a stream of TCP SYN packets that have the source IP address and TCP port number set to the same value as the destination address and port number (i.e., that of the attacked host).
Invalid_header_size Indicates the number of IP packets received with an invalid header size during the last measurement period. Number The IP header size may be termed as invalid due to an invalid data length in the header or when the value in the length field and the actual data length does not match.
Invalid_packet_size Indicates the number of IP packets received by the Netscaler with invalid packet size during the last measurement period. Number  
Truncated_ip_packets Indicates the number of truncated IP packets received during the last measurement period. Number An overflow in the routers along the path can truncate the IP packets.
Truncated_non_ip_packets Indicates the number of truncated non-IP packets received during the last measurement period. Number  
Zero_next_hop Indicates the number of IP packets received with a 0 value in the next hop field during the last measurement period. Number These packets are dropped.
Packets_with_length_gt Indicates the number of IP packets received with a length greater than the normal MTU (maximum transmission unit) of 1514 bytes during the last measurement period. MB  
Pkts_with_bad_mac_sent Indicates the number of IP packets transmitted with a bad MAC address during the last measurement period. Number